OVALdb logo

Professional OVAL Repository

Skip Navigation LinksOVAL > OVAL Definitions

Search Conditions:  Platform: Sun Solaris 9

Page 1 of 5 (194 items)Prev12345Next
OVALid 
Version 
Title 
Class 
Open filter row popup menu
Open filter row popup menu
Open filter row popup menu
xv
oval:org.mitre.oval:def:859935Security Vulnerabilities in GNU tar (see gtar(1)) May Lead to Files Being Overwritten, Execution of Arbitrary Code, or a Denial of Service (DoS)vulnerability
oval:org.mitre.oval:def:827234Security Vulnerability in rm(1) may Lead to Unauthorized Deletion of Files or Directoriesvulnerability
oval:org.mitre.oval:def:745935Security Vulnerability in BIND DNS Software Shipped With Solaris May Allow DNS Cache Poisoningvulnerability
oval:org.mitre.oval:def:743037A vulnerability in the way named(1M) handles recursive client queries may allow a remote unprivileged user to cause named(1M) to return NXDOMAIN (Non-Existent Domain) for Internet hosts thus causing a Denial of Service (DoS) for those hosts to end usersvulnerability
oval:org.mitre.oval:def:72437MIT Kerberos 5 KRB5_AName_To_Localname Multiple Principal Name Buffer Overrun Vulnerabilitiesvulnerability
oval:org.mitre.oval:def:633133A Security Vulnerability in the Solaris rpc.nisd(1M) Daemon may Cause a Denial of Service (DoS) Condition to a NIS+ Servervulnerability
oval:org.mitre.oval:def:616834Race Condition Security Vulnerability in Solaris Auditing Related to Extended File Attributes May Allow Local Unprivileged Users to Panic the Systemvulnerability
oval:org.mitre.oval:def:609236Integer Overflow Vulnerability in the Solaris 8 and 9 sadmind(1M) Daemon May Lead to Arbitrary Code Executionvulnerability
oval:org.mitre.oval:def:600334Security Vulnerability in the X Inter Client Exchange Library (libICE) Shipped With Solaris May Allow a Denial of Service (DoS)vulnerability
oval:org.mitre.oval:def:569236Security Vulnerability in the Solaris sendfile(3EXT) and sendfilev(3EXT) Extended Library Functions may Result in a Denial of Service (DoS) Condition due to a System Panicvulnerability
oval:org.mitre.oval:def:563935Security Vulnerability in the ACL (acl(2)) Implementation for UFS File Systems May Allow a Local User to Panic the Systemvulnerability
oval:org.mitre.oval:def:554336A Buffer Overflow Security Vulnerability in the Solaris sadmind(1M) Daemon May Lead to Execution of Arbitrary Codevulnerability
oval:org.mitre.oval:def:553235Security Vulnerability in FreeType 2 Font Engine May Allow Privilege Escalation Due to Heap Overflowvulnerability
oval:org.mitre.oval:def:547436A Security Vulnerability in the USB Mouse STREAMS Module May Lead to a System Panicvulnerability
oval:org.mitre.oval:def:539334Security Vulnerability in the Solaris X Server May Lead to Unauthorized Disclosure of Information on Access Restricted Files and Directoriesvulnerability
oval:org.mitre.oval:def:534735Heap-based Buffer Overflow Vulnerability in the Solaris 8 and 9 sadmind(1M) Daemon May Lead to Arbitrary Code Executionvulnerability
oval:org.mitre.oval:def:528235Solaris 9 sshd(1M) Patches May Cause Incorrect Audit Data to be Loggedvulnerability
oval:org.mitre.oval:def:493633Kerberos 5 KDC ASN.1 Error Handling Double-free Vulnerabilitiesvulnerability
oval:org.mitre.oval:def:472534Security Vulnerability in the Solaris crontab(1) utility may allow execution of Arbitrary Codevulnerability
oval:org.mitre.oval:def:44934Bind OPT Resource Record DoS Vulnerabilityvulnerability
oval:org.mitre.oval:def:411434Apache Error Log Escape Sequence Injection Vulnerabilityvulnerability
oval:org.mitre.oval:def:346537SunOS 5.9: ufs and fsck patchvulnerability
oval:org.mitre.oval:def:302735Security Vulnerabilities in Solaris Kernel Statistics Retrieval Process May Allow a Denial of Service (DoS)vulnerability
oval:org.mitre.oval:def:277038Solaris 9 CDE ToolTalk Database Server Symbolic Link Vulnerabilityvulnerability
oval:org.mitre.oval:def:259238KCMS KCS_OPEN_PROFILE File Disclosure Vulnerabilityvulnerability
oval:org.mitre.oval:def:221435A Security Vulnerability in the Handling of Thread Contexts in the Solaris Kernel May Allow a Denial of Service (DoS)vulnerability
oval:org.mitre.oval:def:217335A Security Vulnerability With the Special File System (SPECFS) strfreectty() Function May Allow a Local Unprivileged User to Panic a Systemvulnerability
oval:org.mitre.oval:def:216434Security Vulnerability Due to Buffer Overflow in The format(1M) Command May Allow Privilege Elevation For Certain RBAC Profilesvulnerability
oval:org.mitre.oval:def:212134Security Vulnerabilities in Solaris ld.so.1(1) may Lead to Execution of Arbitrary Code with Elevated Privilegesvulnerability
oval:org.mitre.oval:def:198035Multiple vulnerabilities in libfreetype, Xsun(1) and Xorg(1)vulnerability
oval:org.mitre.oval:def:196635A Security Vulnerability in the in.iked(1M) Service May Lead To a Denial of Service (DoS)vulnerability
oval:org.mitre.oval:def:181035Multiple vulnerabilities in libfreetype, Xsun(1) and Xorg(1)vulnerability
oval:org.mitre.oval:def:176034Security Vulnerability in X Display Manager (xdm(1)) Xsession Scriptvulnerability
oval:org.mitre.oval:def:172635Security Vulnerability in the Kerberos Administration Daemon (kadmind(1M)) May Lead to Arbitrary Code Executionvulnerability
oval:org.mitre.oval:def:170734Enterprise Storage Manager 2.1 SAN Manager management station patchvulnerability
oval:org.mitre.oval:def:17036Sun Solaris Gzip Race condition and Directory Traversal Issuesvulnerability
oval:org.mitre.oval:def:161737XPM Image Decoder Buffer Overflowvulnerability
oval:org.mitre.oval:def:148236Management Console Directory Traversal Vulnerabilityvulnerability
oval:org.mitre.oval:def:147035Alternate ps Command Information Disclosure Vulnerabilityvulnerability
oval:org.mitre.oval:def:134134Security Vulnerability in the Authentication Mechanism for Solaris Management Console (SMC) May Lead to Escalation of Privilegesvulnerability
Page 1 of 5 (194 items)Prev12345Next

company ALTEX-SOFT 2008-2019, © ZAO ALTEX-SOFT , ovaldb@altx-soft.com

OVAL and the OVAL logo are registered trademarks of The MITRE Corporation. Other names may be trademarks of their respective owners.